General
-
Target
4bb553f03d5a0eacb37897ca55de9f28041fa8aed77c10791510aa1980cee6e1.bin
-
Size
208KB
-
Sample
240907-1y1p9axfrn
-
MD5
040ed432e4f593758560eb66f5a8ecb2
-
SHA1
f9cec59582a9395e921d80248020eb050273754b
-
SHA256
4bb553f03d5a0eacb37897ca55de9f28041fa8aed77c10791510aa1980cee6e1
-
SHA512
69644f0d8e25ba874de6b3ae2843f3f077675b1898f4617f044a4b947433364c90b1e1d5c59775ba2a50ee6bec69be58fe9655030b0c8c44d10d08c47f786711
-
SSDEEP
3072:sE7PCaH4o51AsAAQEmYVhEqVIweuIqKZMTC2OdDPF6G5HTajAKUmrWUV3neRfa0S:s+PCa9nqAvK9MhaF6GFZqheciQZD
Static task
static1
Behavioral task
behavioral1
Sample
4bb553f03d5a0eacb37897ca55de9f28041fa8aed77c10791510aa1980cee6e1.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
4bb553f03d5a0eacb37897ca55de9f28041fa8aed77c10791510aa1980cee6e1.bin
-
Size
208KB
-
MD5
040ed432e4f593758560eb66f5a8ecb2
-
SHA1
f9cec59582a9395e921d80248020eb050273754b
-
SHA256
4bb553f03d5a0eacb37897ca55de9f28041fa8aed77c10791510aa1980cee6e1
-
SHA512
69644f0d8e25ba874de6b3ae2843f3f077675b1898f4617f044a4b947433364c90b1e1d5c59775ba2a50ee6bec69be58fe9655030b0c8c44d10d08c47f786711
-
SSDEEP
3072:sE7PCaH4o51AsAAQEmYVhEqVIweuIqKZMTC2OdDPF6G5HTajAKUmrWUV3neRfa0S:s+PCa9nqAvK9MhaF6GFZqheciQZD
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-